CA2359539A1 - Flooding communication - Google Patents

Flooding communication Download PDF

Info

Publication number
CA2359539A1
CA2359539A1 CA002359539A CA2359539A CA2359539A1 CA 2359539 A1 CA2359539 A1 CA 2359539A1 CA 002359539 A CA002359539 A CA 002359539A CA 2359539 A CA2359539 A CA 2359539A CA 2359539 A1 CA2359539 A1 CA 2359539A1
Authority
CA
Canada
Prior art keywords
node
nodes
message
data
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002359539A
Other languages
French (fr)
Inventor
Kevin R. Driscoll
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Honeywell Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2359539A1 publication Critical patent/CA2359539A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1854Arrangements for providing special services to substations for broadcast or conference, e.g. multicast with non-centralised forwarding system, e.g. chaincast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • H04L12/403Bus networks with centralised control, e.g. polling
    • H04L12/4035Bus networks with centralised control, e.g. polling in which slots of a TDMA packet structure are assigned based on a contention resolution carried out at a master unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1863Arrangements for providing special services to substations for broadcast or conference, e.g. multicast comprising mechanisms for improved reliability, e.g. status reports

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Communication Control (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Coloring Foods And Improving Nutritive Qualities (AREA)

Abstract

A communication protocol and hardware is provided which allows a meshed network to reliably perform in a real-time environment. The protocol establishes that a single node will transmit on the mesh at any given time.
The transmitted message is propagated to all other nodes on the mesh by flooding the network. Immediately upon receiving each bit of data, a receiving node will immediately retransmit that bit, thereby increasing the speed of the flooding. Arbitration and lockout logic is provided which assures that nodes receiving data from multiple sources will be able to correctly handle and retransmit that data.

Description

FLOODING COMMUNICATION
BACKGROUND OF THE INVENTION
FIELD OF THE INVENTION
This invention relates generally to communication methods and topographies.
More specifically the invention relates to a circuit and protocol useful in propagating information through a mesh topography in a reliable manner for real-time applications.
DESCRIPTION OF THE RELATED ART
In order to communicate electronic information from one point to another, that information must be passed from the transmitting point to the receiving point along some connecting medium. In a telegraph, for example, an electric circuit is opened and closed in a predictable and understandable manner so that signals generated on one end I S of the line are received and understood at the other. This works extremely well when there is only one transmitting point and one receiving point. Problems begin to occur if both points are capable of transmitting along the same wire. If both points happen to generate signals at both ends of the wire, indiscernible noise is produced and neither side can understand the others message. Consequently, a probability problem exists in that the system will work fine when only one end is transmitting and will collapse only when both sides happen to transmit at the same time.
To increase the usefulness of the system, it is helpful to have multiple stations along an interconnected single line, spanning some great distance. In this configuration, there would be many stations which would have access to the communication network.
Despite the obvious benefit of multiple stations accessing the network, the probability of any two stations transmitting at the same time is greatly increased. As discussed above, this creates the risk of any particular message not being received.
While telegraphs certainly are not relied on to communicate information today, many modern electronic devices suffer from the same problems as described above. For instance, different components in a personal computer must communicate with each other as well as a CPU. On a larger scale, a plurality of computers may wish to communicate with each other on an intranet or even the Internet. The problem is the -2- .
same in each instance; how can interconnected electronic components communicate over a shared line?
Many types of solutions have been used in the past to solve this communication problem. Figure 2 illustrates one previous solution well known as a "bus"
topography.
Each Node N in network l00 is connected to the bus 10, essentially in series.
When any Node N sends a message, its is rapidly received by all of the other nodes N by traveling along bus 10. Whichever Node N the message was intended for will likewise receive the message and process the information. There are three distinct problems with this type of topology. First, as in the telegraph example, multiple nodes N may wish to transmit at the same time. Second, if the link between any pair of nodes N is severed, the entire system is at least severely impaired and possibly totally disabled.
Third, in real world applications the configuration of the nodes N is not likely to be as symmetric as schematically illustrated.
One way of dealing with the first problem is to use a protocol known as Table Driven Proportional Access (TDPA), as shown in Figure 1 1. With this protocol, each Node N has an identical table 20. The tables 20 will designate which particular Node N
will be able to transmit at any given time. In the example presented, there are four nodes, numbered 1-4. Each Node N has a node indication pointer 30 which steps through the table sequentially and indicates to all of the nodes N
concurrently, which Node N is designated to transmit. 1n Figure 11, the pointer 30 indicates that node 3 is able to transmit. At this point, all other nodes N will "listen" for a message which may or may not be transmitted by node 3. After the message has been transmitted, the pointer 30 advances to the next index identifier which happens to indicate that node I
will be free to transmit. The pointer advances through the table, and when the end is reached, it is reset to the beginning. In this manner, each Node N knows when to ''speak" and when to "listen". thus avoiding the problem of two nodes N
simultaneously attempting to transmit at the same time.
TDPA is a commercially accepted and well known protocol. however there are a wide variety of other protocols which may be used with a standard bus. In some of those protocols, such as CSMA, multiple nodes N could transmit at the same time.
When this occurs, the two signals will "crash" into one another. The system will then recognize this collision and each Node N will attempt to resend its respective message.
To avoid colliding again, the two nodes independently select random delay times (which are highly likely to be different from one another) and wait for that period of time before resending. Probability suggests that the two messages will eventually each be sent.
though subsequent collisions are possible (thus causing each node to again select a randam delay time and restart the process). When using this protocol, the collision could occur at any given point along the bus. Thus, one or more nodes N may have received one of the messages prior to the collision and would therefore not recognize that there was a collision. Ultimately, when the message is resent, those nodes N would interpret the message as a new one, not a repeat of the old. 'Io avoid this, when a collision occurs, each node detecting the collision immediately transmits a jam signal to the remaining nodes to indicate the collision occurred. This protocol will eventually get information to its proper destination, but is inherently slow and easy to bog down.
The second major problem with the use of a data bus occurs when a link 150 between a pair of nodes N is severed or a particular node malfunctions (emitting spurious information). In this condition the entire system is impaired. This malfunction could occur in either the connection between Node N and the bus or along the bus between the individual nodes N. Figure 5 shows a bus 10 having four nodes N1-N4. As illustrated by the X through the bus 10, the link between N3 and N4 has been severed.
This could completely shut down the system.
To prevent a catastrophic failure caused by the severing of a connection, redundant bus line 10' may be added. In summary, 100% of the existing bus line is duplicated to achieve one level of redundancy. Figure 8 shows how three buses may be used to achieve two levels of redundancy. Obviously, this method of protection requires an excessive amount of cabling, thus increasing the cost and complexity of the system.
Returning to Figure 5, a second potential problem is depicted in which there is a problem with the node itself (sec N2 crossed out). The node may be generating random or spurious signals thus producing noise on both the bus 10 and 10'. Such a malfunctioning node can also cause a change in the impedance of the connective media.
When this occurs, the node is known as a babbling node. Thus, no matter the level of redundancy achieved, a single babbling node could shut down the entire system.
The third major problem with the use of a data bus is the physical parameters of the interconnecting cable. As shown in Figure 13, the various nodes N are seldom -4- , symmetrically spaced, hence interconnecting cables. or links 150, of different lengths must be utilized. Due to the nature of the propagation of signals, a maximum length of interconnecting cable cannot be exceeded, thus limiting the physical configuration of the data bus.
Another commonly used topology is the ring, shown in Figure 3. Here, the network 100 will form a serially connected closed loop of nodes N. The ring will suffer many of the same problems as the data bus described above. Figures 6 and 9 show the additional cabling required to create single and double redundancy. Similarly, Figure 14 shows a ring which is configured asymmetrically. As can be seen, this configuration requires many cables of differing lengths.
Yet another known topography is a mesh network 100 as shown in Figures 1 and 7. In a mesh, each Node N is Linked to a plurality of other nodes N in a grid-like manner. Therefore, there are a plurality of paths between a given pair of nodes N.
The great advantage to using a mesh is the inherent reliability of the structure.
A mesh is the only inherently fault-tolerant topology. Turning to Figure 4, if any particular link 150 is severed, an alternate route is still available. In large networks, this is a tremendous cost savings in that superior reliability is achieved while using less cable than in other topologies.
Turning to Figure 10, the transmission protocol of a meshed network 100 will be described. Propagation of a signal is achieved by flooding the network 100.
That is, a signal is generated by a source and transmitted to all connected nodes. Each receiving node then retransmits the message. The nodes N receiving that signal again retransmit the signal until eventually every node on the network has received at least a portion of the transmission. In Figure 4, Node S represents the source of the transmission and Node D is the intended destination. Node S transmits a signal to its four connected nodes (three of which are shown). Each of those nodes N then transmit until eventually Node D is reached. Now assume that the path shown by the solid arrows is the first path by which data reaches Node D. Once achieved, this becomes the selected path and the entire message is transmitted along the path shown by the solid arrows from Node S to Node D. Therefore, the flooding protocol is only used to determine a path and once so established, the redundant transmissions by the other nodes N are ignored. The next time a source wishes to transmit. the flooding protocol is again performed to establish a -5- , path. That way, if a link 150 has been severed between transmissions, a working connective path can still be established. It is worthwhile to note that the path shown by the solid arrows is only one of many which could occur. Using this mesh configuration, multiple links could be severed while still allowing 100% use of the network.
There are two commonly known networks which use similar protocols on a mesh. Namely, the telephone system and the Internet operate using these principles.
When a telephone number is dialed, the first few digits dialed allow a connection to a nearby node; the next few allow connection to a more distant node and so on until the connection is established to the recipient. Once the connection is established that single pathway is maintained for the duration of the call. All data is transmitted over that single path. Referring to Figure 10 if Node S is the caller and Node D is the recipient, the connection is again shown by the solid arrows.
The Internet works on a slightly different principal. That is. rather than using flooding to establish a path and then passing the information along that path, the Internet I S protocol causes the entire message (packet) to be transmitted to each node. Information in the header of the message will define the ultimate destination. Referring the Figure 10, Node 10 transmits an entire message to its connected nodes. The connected nodes wait until the entire message is received and then retransmit the entire message. As described above, this will eventually reach Node D, and the message will be properly received.
The problem with this "Internet" protocol is that each Node N is only capable of holding a finite amount of information at any given time. Therefore, if Node S
transmits to a connected Node N but that connected node has insufficient memow to store the message, the message is lost, The mesh arrangement will allow the information to eventually reach a distant node, such as Node D. However, if the intended recipient was a node connected to Node S or if all of the nodes representing paths to the destination were similarly memory deficient, the message would never be received.
Another problem with the Internet protocol is that it is rather slow. Since the entire message must be transmitted as a whole from a source node to every other node, the result is a relatively slow transmission. This makes such an arrangement undesirable for many real-time uses. Furthermore, more delay is added by the memory 6 PCTlUS99/30682 deficiency problems addressed above.
One final problem with the use of a mesh topology is the likelihood of any particular Node N receiving messages from two different nodes N at exactly the same time. The Node N is usually designated to select the message it receives first and to process that message. However, there will always be cases where it is too close to call and the electronics used to detect the messages will become metastable. When this occurs, the Node N will crash; basically oscillating back and forth between the two possible inputs without producing a useable output.
There are many applications were a properly working mesh would be advantageous, but they are not being used because the current mesh protocols are inadequate. For instance, real-time control systems on aircraft and large scale vehicles, such a buses require fast, reliable and accurate data transmission. Therefore there exists a need to have a highly reliable mesh network capable of rapid transmission to facilitate real-time applications.
SUMMARY OF THE INVENTION
The present invention relates to the propagation of data signals over a meshed network of nodes. A mesh is simply a plurality of nodes, connected to one another along a plurality of different paths. That way, if any particular link is severed or damaged, alternate routes are available for the data to travel.
Current mesh protocols are not feasible for use in systems which require reliable, real-time data transfer. The present invention modifies the concept of flooding to provide a protocol which is both fast and reliable.
In the present invention, a single node is allowed to transmit at any given time.
To correlate when any particular node will transmit, the nodes utilize the TDPA
protocol. That is, the nodes each have corresponding tables which indicate to all of the nodes, when and which node may transmit. The table is time based. Therefore, each node has a particular amount of time within which to transmit. After that time has expired, the tables indicate that a different node is now capable of transmitting.
Once designated, the node begins to transmit a message bit by bit. The first bit is sent out on all links of the node and is received by other nodes so connected.
Immediately upon receipt of the first data bit, the receiving nodes retransmit that bit to WO 00/41506 PCTlUS99/30682 _7_ all of the links that it is connected to. In this manner, the entire network will soon be flooded by the first data bit.
Immediately thereafter, the transmitting node will send the second bit, then the third and so on, until the entire message is sent or its time limit expires.
In this fashion, the entire message floods the network, bit by bit.
In order to accomplish this, the receiving nodes must have a mechanism to lock out the links which have not received data. The nodes must also have a mechanism by which they can distinguish between two messages which arrive on different links at or about the same time. Without such mechanisms, the message could be received for a second time by a node. In effect, this would cause the message to be sent to nodes which have already passed the message along. If this occurred, a single message could propagate through the network indefinitely. Furthermore, if two messages arrive at or about the same time, it is possible to cause current node electronics to become metastable, thereby causing the message to be lost.
The present invention employs a novel arbitration and lockout circuit to solve these problems. Once the first bit of a message is received, the circuitry locks the node into a particular configuration for the remainder of the message. In that configuration, only the originally receiving link will be allowed to affect the nodes output.
In this manner, if data is sent back to an earlier node, it will be ignored. 'fhe circuitry also has an arbitration function. This allows the link which first receives the signal to control the output. However, if two links receive the message at exactly the same time, they are both allowed to affect the output. Since, the TDPA protocol only allows one message to be sent at any one time, that would mean the both links are receiving the exact same data at the exact same time. Therefore, even if two links affect the output, the net result is the same because of the circuit's ability to combine the signals. Finally, if two signals arrive very close together, but not simultaneously, the first signal is allowed to pass and becomes the output. The second signal may cause the link it was received on to become metastable. The present circuitry allows for this portion of the node to become metastable while still allowing the first link to correctly output data from the node.
The present mesh protocol also uses a time based pointer to advance through the TDPA table. As explained above, each node is allotted only so much time to transmit, then the pointer automatically advances within the table. Since data takes some amount _8_ of time to propagate between the various nodes, a delay is added. By monitoring the number of nodes the data passes through from its source to any receiving node, that node is able to calculate the delay imposed and calibrate its time based pointer with that of the transmitting node. In this way, the network remains synchronized.
Another aspect of the present invention is the concurrent propagation of multiple messages over a single meshed network. As discussed above, TDPA will only allow a single node to transmit at any given time. However, by dividing the mesh into a plurality of submeshes, a single message could propagate over each submesh, thus increasing the bandwidth of the entire system.
Each node, in a preferred embodiment has four nodes and a local connection.
Therefore each node is capable of handling two different messages simultaneously.
Within a defined submesh itself. the nodes will behave exactly as node in a single mesh.
Along a border, diving the various submeshes, the nodes will behave differently. That is, a message generated in a given submesh must remain in that submesh and not be allowed to enter a different submesh. The nodes along the border will generally have two links in one submesh, and two links in a different submesh. A protocol is established which temporarily connects these two links. Assuming the node has links numbered l, 2, 3 and 4, a first message will only be allowed to be input and output over links I and 2, while a second message will only be allowed to be input and output of links 3 and 4. The particular connectivity of the links may be static or varied as often as each table entry.
rho further facilitate the integrity of the network, self checking pairs may be employed. That is, every original node is replaced with a pair of nodes and a pair of cables (rather than just one) form each link. In this manner, each pair of nodes compares the data it receives along the two connectors of the link. If the two are identical, the nodes determine the message to be accurate. If, however, there is a difference in the message, the nodes determine that the message has become corrupted, and disregard the message.
It is an object of the present invention to provide a protocol for a meshed network which allows for reliable real-time use of a system.
It is another object of the present invention to provide a meshed network having nodes capable of arbitrating between concurrent messages and also to remain unaffected -9- , when various electronic components become metastable.
It is yet another object of the present invention to provide a meshed network with the ability to send multiple messages along various submeshes simultaneously.
It is yet still another object of the present invention to provide a minimal data signal to trigger the linking connectivity protocol in the various links of a node Iving on the border of a submesh.
It is a further object of the present invention to provide a synchronizing component to a message stream in order to correlate the tables and time based pointers within each node of a network.
It is still another object of the present invention to provide a meshed network having self checking pairs, by which the integrity of the data transmitted may be verified.
It is yet still another object of the present invention to provide a mechanism by which newly added or rejoined nodes to a mesh can self synchronize with the remainder of the nodes.
BRIEF DESCRIPTION OF THE DRAWING
Figure 1 is a schematic diagram which shows a plurality of nodes connected in a mesh.
Figure 2 is a schematic diagram which shows a plurality of nodes connected to a bus.
Figure 3 is a schematic diagram which shows a plurality of nodes connected in a ring.
Figure 4 is a schematic diagram which shows a meshed network having a bad node and a severed link.
Figure 5 is a schematic diagram which shows a duplex bus having a bad node and a severed link.
Figure 6 is a schematic diagram which shows a duplex ring network having a severed link and a bad node.
Figure 7 is a schematic diagram which shows a meshed network.
Figure 8 is a schematic diagram which shows a triplex bus.
Figure 9 is a schematic diagram which shows a triplex ring.

WO 00141506 PCTlUS99130682 -10- .
Figure 10 is a schematic diagram which shows the propagation pattern of a meshed network.
Figure I I is a schematic illustration of a sequencing table in a TDPA
protocol.
Figure 12 is a schematic diagram which shows an asymmetric mesh network.
Figure 13 is a schematic diagram which shows an asymmetric bus.
Figure 14 is a schematic diagram which shows an asymmetric ring.
Figure 15 is a schematic diagram which shows the propagation sequence of a meshed network.
Figure 16 is a circuit diagram of one embodiment of an arbitration and lockout logic circuit.
Figure 17 is a schematic diagram which shows a plurality of nodes and their associated tables.
Figure 18 is a schematic diagram which shows a meshed network having two submeshes.
I S Figure 19 is a table which shows the link interconnectivity of a node in a submesh.
Figure 20 is a schematic diagram which shows a meshed network having two submeshes.
Figure 21 is a table which shows the link interconnectivity of a node in a submesh.
Figure 22 is a schematic diagram which shows a meshed network having self checking pairs.
Figure 23 is a schematic diagram which shows a meshed network along with the propagation of a data signal.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
The present invention uses a unique data transfer protocol and related mechanisms to obtain an accurate and reliable level of usage on a mesh topology.
Figure 1 S shows a network 100 having a plurality of nodes N which arc interconnected by a plurality of cables 110 which farm links 150. The nodes are representative of any communicating electronic components; including various components connected in a single computer, a plurality of computers connected together. or any plurality of components connected to form a system. Each Node N will have a receiver and a transmitter of some type integrated into it. The cables 110 can be any type of electrical interconnection, including wire connectors or fiber optic cable.
The current network 100 uses a flooding protocol to deliver information from one Node N to another. When a particular Node N wishes to transmit information to a particular destination, it starts transmitting the message to all of the nodes N it is connected to. For example, in Figure I S Node S wishes to transmit a signal to Node D.
That message is first sent to its connected neighbors (identified as N') and is represented by the solid arrows 4U. Immediately upon receipt of the first bit of information, all of the receiving nodes begin to retransmit the message to their neighbors. That is, the current protocol retransmits the entire message bit by bit through each Node N, rather than waiting for the entire message to be received before commencing retransmission or simply using the flooding parameters to establish a single path. Once the first data bit is received by the connected nodes N', they retransmit that bit. This second level transmission is represented by the dashed arrows 42. Once this second tier of nodes N
receives that first bit, they retransmit it. This third level transmission is represented by the dotted arrows 44. When this third tier of nodes N receives the first bit of information, they retransmit it. This fourth level of transmission is represented by the dotted and dashed arrows 46. This process continues until all of the nodes N, including Node D, have received the particular bit of information. Immediately after sending the first bit of information, Node S sends the second, then the third and so on, until the entire message is sent. Therefore, the entire message is sent, bit by bit, through each Node N in the system.
To avoid the problem of multiple messages being promulgated simultaneously and causing failures, a single Node N is selected to transmit for a given period of time.
The selection of this Node N is discussed later. The remaining nodes then perform the following steps. First, all non-transmitting nodes N are set to listen for an incoming message on all links. Second, if an incoming message arrives on a particular link that link is then selected as the source. If two messages arrive simultaneously, one is selected as the source. Third, rebroadcast the input to all other links 150 while simultaneously locking out any other input. Fourth, at the end of the message, unlock all the links and go to the First step.

WO 00141506 PCTlUS99/30682 As discussed above. problems have occurred in the past when a Node N receives two messages at or about the same time and the electronics cannot distinguish between them. In this situation, the Node N becomes metastable. Left in this condition, the first bit (or any subsequent bit ) of information may be indefinitely looped, by traveling S through a given Node N more than once. 'To overcome this problem, arbitration and lockout logic (A&LL) is employed in each Node N. One configuration for this circuitry is shown in Figure 16.
In the various other Figures, each Node N is shown having four links 150 to the other nodes N. This particular number of links 150 is arbitrary and may be more or less dependent upon the end use of the system. The circuitry of Figure 16 shows two links 150 of a single Nodc N. For each additional link employed, the circuitry will be repeated, as understood by those skilled in the art.
The A&LL circuitry 102 of Figure I 6 works in the following manner. When any given link 150 is idle (i.e., no message is being received) the link 150 is maintained in a listening state. Within the communication system all messages will begin with a "1." When a "1" is received, the link 150 is set to a receiving state.
Whenever a Node N is to be in the idle state, an idle input 122 is pulsed to set the flip-flops 120, so that a "1" (high logic output) is maintained on the Q output of each of the flip-flops 120.
When the first bit of data from the message arrives at an idle link input 160, it passes "through" the flip-flop 120 (because the Q output is already high) and also travels directly to a first input 131 of an AND gate 130. Since the "idle" flip-flop 120 has a "1"
on its Q output (which is coupled to a second input 132), and the link 150 also has a "1"
present, which is coupled to the first input 131, a high signal is present at the output of AND gate 130. This "1" is then presented to an OR gate 140.
The output of the OR gate 140 then becomes the output 142 for that particular Node N, and hence is the signal generated on all of that node's N output links 162. The signal from the OR gate 140 is also simultaneously returned to the clock input l21 of all of the flip-flops 120 in that particular Node N. When the clock signal is received, only the link 150 having first received the message will have a "1" on the D input of its flip-flop 120. The remainder of the flip-flops 120 will have a "0" (low logic signal) on their D inputs. As such, when the clock signal from the OR gate 140 is received, these flip-flops 120 will produce a "0" at the Q output. This "0" on the Q output is then presented WO 00/41506 PC'T/US99/30682 to the related AND gate 130. This will cause each AND gate to have its output stay at "0." As such, these flips flops (and hence their associated links 150) will have no ei~fect on the output of the Nodc N for the remainder of the message.
The link 150 first receiving the message and having a "1" at its D input, since it continues to have a "1" at its Q output. will pass the entire message through the flip-flop 120, through the AND gate 130, and ultimately through the OR gate 140 as the output 142 of the Node N. At the end of the message, the idle input 122 is tripped, thus resetting all of the links 150 and their flip-flops 120 to the listening mode wherein all will have a "1" on their Q output.
In this manner, only the link 150 first receiving a particular message will be able to affect the output of the Node N. All other inputs will effectively be ignored.
'There is some finite probability that two different links 150 in the same Node N
will receive a message simultaneously or within a small window of time, historically creating a problem for the Nodes. This creates a potential problem as the alternate links 1 S will not yet be "locked out." For two signals to arrive "simultaneously", and this condition to exit, they must each reach their respective links 1 SO within the minuscule time window defined by the sum of the AND and OR gate delays minus the flip-flop 120 set up time.
When two signals arrive simultaneously, they will necessarily be the same message (as explained later). Therefore both flip-flops 120 and ultimately both AND
gates 130 will be actively outputting the same signal. Since these signals pass through an OR gate 100, the final output 142 of the Node N will be virtually unaffected. That is, the correct message will be output by the Node N.
Now, if a message arrives at two or more links 150 relatively close together in time, there is a possibility that one (or more) of the flip-flops 12U will become metastablc. Referring again to Figure 16, assume a message, starting with a "1 ". arrives at the top link 150. As described above, the ''1" will pass directly to the first input 131 of the AND gate 130. Since the flip-flop 120 was idle and a "1" is present on the Q
output, both inputs to the AND gate 130 are "1." Consequently, a "1" is passed to the OR gate 140. The OR gate 140 outputs a "1 " which then comes back to clock the flip-flops 120. Now, also assume that while this is occurring, the message is arriving at the lower link I S0. This message will also start with a "1 ", therefore this pulse is traveling to the D input of the flip flop 120. When the clock signal reaches the lower flip flop 120, something other than a "0" or a "1'", i.e., a half pulse, may be present at the D
input. This may cause the flip-flop 120 to oscillate back and forth and become metastable. As long as it is the same message being received by both links 150, it is S irrelevant that the lower flip-flop 120 is metastable, because the upper flip-flop 120 will not be metastable and will produce a signal. If the metastable flip-flop 120 happens to oscillate such that an output is produced, no harm results because it will coincide with the functioning flip-flop 120.
To achieve the above result, it is important that when two messages are received simultaneously or nearly simultaneously, that they be the same message. If nodes N are simply allowed to independently generate messages at any given time, there is a likelihood that two different messages could arrive simultaneously at two different links 150 of a single Node N. 1f this were to occur, a spurious message would be generated by that Node N and subsequently transferred on. Therefore a protocol should be established to delineate when any given Node N should be in a transmit mode and when it should be in receive mode.
As discussed above, one way of doing this is to use the Table Driven Proportional Access (TDPA) protocol. Referring to Figure 17, four meshed nodes N are shown as Nodes I-4. Above the nodes N, their respective tables 20 are shown schematically. This would, of course, be an internal programming function. The tables 20 delineate when any given Node N may transmit a message. If a Node N is not designated as transmitting, it is set to receive or "listen" for incoming messages. As shown in Figure 17, Node 3 is cun-ently designated as the transmitting node.
Nodes 1, 2 and 4 (and any other connected nodes) will wait a specified period of time for Node 3 to send a message. The time based pointer 31 determines that Node 3 is enabled.
This time based pointer 31 simply steps through the table 20 in a sequential order, and when the end is reached, starts anew at the beginning of the table 20. The ordering of the nodes within the table is arbitrary and any sequence may be selected, so long as each nodes' table coincides.
There are various ways to advance the pointer. Each Node N may simply be given a predetermined amount of time to transmit a message. The selected node may transmit or remain silent, while the remaining nodes N are set to receive for that time WO 00!41506 PCTIUS99/30682 period. When that time period is done, that Node N simple ceases transmission and the time based pointer 31 advances. Alternatively, data could be included as an End of Message (EOM) indicator. Thus, the transmitting Node N, would transmit its entire message, no matter the time period. When that message is completed, the EOM
will cause the pointer (no longer time based) to advance to the next Node N in the table 20.
This is not a preferable protocol, however, as it not possible for all of the nodes N on the mesh to simultaneously perceive the EOM. Current mesh protocols (as well as many bus protocols) do use the EOM indicators to account for slow drifts of individual clocks in each Node N which occur with the time based protocol.
In a preferred embodiment, a time based pointer 30 is used with the TDPA
protocol, while also including an additional data segment. This data segment will indicate the number of links traveled by the message. As discussed above, with each tier of nodes N that the data travels through, a time delay is added (from the point of original transmission). By knowing how many tiers the information has passed and 1 S knowing the average delay caused, each Node N can essentially calculate the time of the original transmission. Therefore, the time based pointers 30 of the various receiving nodes N will be con:ectly calibrated with that of the transmitting Node N. To accomplish the addition of this data segment, a field is added to the message which counts the tiers it traverses. The count is incremented as it passes through each Node N
with a serial one-bit adder such that no additional delay is caused by the counter itself.
Referring again to Figure 17, only four nodes N are shown and the table 20 only accounts for these four nodes N. Obviously, as additional nodes N are added, they must be accounted for in the table 20. As indicated, Node 3 is currently the transmitting Node N. This is represented by a solid arrow 162 outputting from Node 3. All of the outputs from the other nodes N are shown as an open arrow 163. It should be noted that Node 3 is transmitting in all four directions, thus any added nodes N, above and below Node 3 would also receive the message. Once a single bit of information is received by any of these nodes N, it is immediately repeated. 'therefore, there exits a distinction between a nodes N capability to transmit an original message and to simply repeat a received message.
Figure 24 shows the same Nodes 1-4 as in Figure 17, only now some minuscule amount of time has passed. Node 3 has successfully transmitted the first bit of its data -16- , message to Nodes 2 and 4. Immediately upon receipt of that data bit. Nodes 2 and 4 retransmit that data bit on all of their outgoing links 165. Links 165 were previously open arrows, and are now solid indicating that they are rebroadcasting a received message. T'he outgoing links 162 of Node 3 continue to be solid arrows because Node 3 is sending the second and subsequent data bits of the particular message. The outgoing links 163 of Node 1. remain open arrows because Node 1 has not yet received a data bit to rebroadcast and it is not designated by the table 20 as being able to transmit an original message.
Everything described above refers to a single Node N on the mesh transmitting and every other Node N receiving (and repeating). The mesh is, however, capable of handling multiple messages simultaneously. Referring to Figure 18. a mesh having 54 nodes is shown. This mesh is capable of working as described above, i.e., a single transmitting node while every other Node N receives and repeats. In addition, each individual Node N is capable of handling two separate messages. For the sake of clarity, these will be described as message 1 and message 2. Any number of submeshes can be defined within the overall mesh. 'Then a single Node N in each submesh can transmit simultaneously. For instance, an artificial boundary, defined by the dashed line X-X divides the mesh diagonally in half. The boundary can be defined in any shape or configuration to create any number of submeshes. Nodes N entirely within any submesh will behave exactly as described above, that is any message received on a link 150 will be repeated on all links 150. The advantage to establishing submeshes and transmitting multiple messages simultaneously, is the increase in bandwidth which results. This capability is not available with standard buses.
Those nodes N which lie on the boundary must be configured to handle two different messages. Any given Node N, has four links plus its local connection.
Referring to Node 22, the links are designated as North, South, West and East.
In the example shown by Figure 18, line X-X divides the mesh into a right submesh and left submcsh. Therefore any message transmitted by a Node N in the right submesh must stay within the right submesh. To accomplish this, those nodes N along the boundary X-X have a specific link protocol. That is, any message coming in from the North will only be transmitted to the Fast, and vice versa. Any message coming in from the South will only be transmitted to the West. and vice versa. It should be noted that the Node N

can handle two different messages simultaneously. Various boundaries may be established so that any two links may be coupled as described. In Figure 18, message l (M 1 ) approaches Node 22 from the right. Message 2 (M2) approaches Node 22 from the left. Assuming M1 arrives at the East link, Node 22 will only repeat this message on the North link. Also, and possibly simultaneously, M2 will arrive at the South link, and will then be repeated only on the West link. To accommodate this, the A&LL
logic is switchable between these various link configurations.
The above described arrangement could be a permanent division of the mesh, however it would preclude the use of the full mesh. A preferable embodiment is shown in Figure 19 which depicts a hybrid portion (Table 22) of the TDPA table 20 which was used to designate which nodes within a system can transmit. Table 22 includes an additional byte of data which would be added to the above described TDPA table 20.
Now, table 20 would be defined so that at certain times, multiple nodes N
would be able to transmit at the same time. At other times, only a single Node N may transmit. In Figure 19, table 22 is applied to Node 22 of Figure 18. In the table 22, the first entry indicates that Node 15 and Node 38 will transmit at the same time. Therefore.
the four links ofNode 22 must be set to accommodate this. Node 22 lies along the artificial boundary (X-X) established. Message 1 is designated by zeros and message 2 is designated by ones. The first four bits of the byte in table 22 delineate which message is received and the last four bits designate where that message is repeated.
As can be seen, North and East are set to message 1 and South and West are set to message 2.
Once the time period for those messages has elapsed, the time based pointer 31 advances to the next table 20, 22 entry, which happens to indicate that Node 26 will be the only Node N transmitting. As such, all links are set to receive this single message by setting North, South, Fast and West to the same message. The byte representing this arbitrarily consists of all zeros. After the time period for this message is elapsed, the time based pointer 31 advances once again, indicating that Node 6 and Node 19 will both be transmitting. Therefore, the artificial boundary is again established.
In this way, the entire mesh is used at times and at other times, submeshes are established.
Any combination of the two is feasible. 'this feature is particularly beneficial when it is known that certain nodes will communicate only with other known segments of the mesh.

-1 g- .
Figure 20 shows another possible submesh combination of a 54 node mesh.
Dashed line X-X designates a submesh in the lower right hand quadrant. The links of node 33 have been designated as North, South, East and West. Table 24 in Figure 21 indicates the protocol for this mesh/submesh combination, and will function similarly to table 22. As such, a detailed explanation will be omitted except to note that now the North and West links communicate and the South and Fast links communicate when nodes in different submeshes transmit simultaneously.
A major advantage of the present invention is that a mesh can be used in a reliable and real-time manner. The advantage of a mesh itself is the inherent fault tolerance that it creates. Namely, if any particular link 150 is severed, there are a plurality of alternate paths available. Furthermore. if a Node N ceases to operate, the message is able to bypass it entirely and still be received at its destination via the remaining nodes N. Babbling nodes will only have a certain time window to transmit, therefore, they do not affect the overall performance of the system. There are times when this process needs to be reversed. Namely, when a bad Node N or severed link is repaired, or a new node is added to the mesh, the protocol must account for the added connections. By simply connecting or reconnecting the links 150 to a Node N, data will automatically he transmitted when received, etc. The issue which remains is how the new or rejoined node is synchronized within the parameters of the TDPA timing.
That is, the time based pointer 31 for the new or rejoined node must be synchronized with the remainder of the nodes on the mesh.
In the present invention, when a Node N is added or rejoined to the mesh, the Node N will wait for an intcrmessage gap. At this point, the Node N will take the table 20 entry from the next message and prepare to receive the same message on the next pass through the table 20. This process allows an entire table 20 period within which the Node N can prepare to receive a message.
As mentioned throughout, the mesh flooding protocol will provide the system with a high degree of fault tolerance, however this system alone will not necessarily provide any measure of integrity. That is. there is no way to determine whether the correct message is being received or whether some degree of corruption has occurred.
To give the system this degree of reliability, and hence integrity, Figure 22 incorporates the concept of self checking pairs. With this concept everything is duplicated. For each WO 00/41506 PCT/US99l30682 -19- , Node N there are really two combined nodes 200. 201. Also, for each link 150 there are two data lines 210, 21 1. This is substantially different than the duplexing and triplexing of bus lines discussed above. There, the additional lines were added to simply provide another path, should one path become severed. Mere the idea is that both data lines 210,211 will transmit the same message at the same time and the two separate nodes 200,201 will each receive a message from one of the data lines 210,21 1. Then, the two nodes 200, 201 will do a bit for bit compare bet~~een the messages received via data lines 2l 0,21 1 respectively. The self checking pairs incorporate a comparing circuit to perform this function. If both messages are the same, it is deemed reliable.
If one message differs from the other, something has gone awry and that particular message is ignored. Now this particular Node N will not rebroadcast the corrupted message. Since the A&Ll. logic has presumably prevented the remainder of the links 150 from receiving the same message, that Node N is effectively removed from the mesh for the remainder of the message. However, since the mesh is still inherently fault tolerant, the message will simply bypass the Node N through the above described routine.
Referring to Figure 23 the protocol of the present invention will be summarized.
Figure 23 shows a 55 node mesh having node 300 as its center. Each Node N has a table 2U integrated into its hardware or software. At some point in time, the time based pointer 31 of table 20 will advance to the paint where node 300 is designated as the transmitting Node N. At that point in time, if node 300 has a message to generate, it will begin transmitting that message bit by bit. In Figure 23, assume node 300 has a message to transmit. The first bit of that message is sent out on all four of its connected links 150. That first bit is then received by one link of each of the nodes 301, 302, 303, and 304. This represents tier 1. Since there is no possibility of any other Node N
transmitting at this time, that will be the only link 150 on nodes 301, 302, 303, and 304 which happens to receive a message at that time. Therefore, the other three links 150 of nodes 301, 302, 303, and 304 are "locked" out, that is no incoming messages will be accepted. Immediately, those four nodes 301, 302, 303, and 304 retransmit the first bit of that message. 'hherefore nodes 301, 302, 303, and 304 transmit the first bit to nodes 305, 330, 331, 332, 333, 334, 335 and 336. Nodes 301, 302, 303, and 304 may also transmit the message back to node 300, but node 300 will not be able to receive it.
hence, infinite propagation is avoided. The same will occur in outlying receiving nodes. That is, a node may transmit the message it just received to the node which just sent it. The transmission is allowed, but reception by the earlier node is precluded because of the A&I,I. circuitry.
This will establish tier 2. Since the data bit has past through tier 1, some delay has been added by passing through the Node N. This time delay is indicated by sequentially counting the number of tiers so the tier count would now be 1.
This time/delay factor is correlated to the TDPA table 20. There is some possibility that multiple links 150 of nodes 305, 330, 331, 332, 333, 334, 335 and 336 will receive the message bit at the same time, however this possibility is remote and will not be addressed here. Such a situation would be handled in the manner described below.
Assuming only one link 150 receives the message in nodes 305, 330, 331, 332, 333, 334, 335 and 336 that link will be the only one receiving. This first bit of the message will continue to be passed on in this manner until all 54 of the receiving nodes have received the bit. They need not all be described in detail. If any given link or links 150 happen to be disabled, the signal will simply bypass them.
Assuming a normal working environment, nodes 335 and 336 should receive the first bit at the same time. If the nodes 335, 336 process at the same speeds it is very possible that the first bit will be transmitted to node 337 along two different links 151,152 at the same time. As described above, node 337 will have an A&I,I, circuit to handle this. If the bits arrive at links 151,152 at exactly the same time, both will be set to receive and both will affect the output of node 337. But, since this is the same message, the output will still be correct. Ifthe bits arrive at links 151,152 offset, but within the setup time of a flip flop 120, then the latter arriving signal may cause that links (151 or 152) flip flop 120 to become metastable. This does not pose a problem however, because the other links ( 1 S 1 or 152) flip flop 120 will allow the message to be processed and output by node 337.
Immediately after node 300 transmits its first bit, it will transmit the second bit and that will propagate in exactly the same manner as described above. This occurs because the receiving links have already been established and even if the bit could arrive sooner at a different link, in an outlying node, only the receiving link will be able to process the input (absent a simultaneous tie when the first bit had arrived).
At this point, all of the nodes N that have received the first bit are "locked" into a particular mode. The entire message will pass through them bit for bit in that manner. At some point, node 300 will transmit the last bit of the current message. This propagates through the nodes N in the same manner as any other bit. This last bit may or may not coincide with the end of the time period node 300 is allowed to transmit. The data bits S will propagate through the mesh much like a wave. The front 310 of the wave represents the first data bit. The end 320 of the wave represents the end of the transmission time period for the transmitting node 300. As the end 320 of the wave pass through successive nodes N, it "unlocks" the nodes again setting them to a listening mode. This would correlate to the A&LL logic by tripping the idle input 122 on the tlip flops 120. Therefore, in Figure 23 a doughnut shaped wave is formed by the front of the wave 31 U and the end of the wave 320. As illustrated, the front 310 has just entered node 306, indicating that it has just received the first bit. The nodes outside of the wave, such as node 307 are in a listening mode and have not received any pan of the message generated by node 300. Node 300 has transmitted its entire message and the whole message has passed entirely through nodes 301, 302, 303, and 304. As such, these nodes 301, 302, 303, and 304 are now awaiting the next message. Nodes 305, 330, 331, 332, 333, 334, 335 and 336 are receiving the last bit of information or are simply waiting while the node 300 time period lapses.
After some period of time has passed, the time based pointer 31 in each nodes N
table 20 will advance to the next entry, which specifies which Node N will transmit next. Each nodes N time based pointer will be correlated by monitoring the tier count to account for any delays in propagation.
The same process as described above will occur within each submesh established within a mesh. The boundary nodes will be able to handle two separate messages and will route them appropriately.
Of course, the mesh shown in Figure 23 could have been constructed having self checking pairs to give the system integrity by ignoring corrupt data.
Finally, the mesh propagation systems described above have incorporated a TDPA protocol. Various other established protocols such as CSMA could be adapted to work within the spirit and scope of the present invention. For instance, with CSMA
there is no designation as to when a particular node will transmit. Therefore there exists a likelihood that messages may collide. When this occurs, a jamming signal is sent out to obviate the message. Further, this system uses an end of message (EOM) indicator embedded within the message to let each Node N know when the message is complete.
This EOM would correspond to the end 320 of the wave in Figure 23. This system, while functional, is not preferable in systems which require real-time access and control because of the non-deterministic nature of the propagation. 'I~hat is, collisions and jamming signals add spurious and unpredictable time delays which may adversely affect precisely controlled systems.

Claims (26)

1. A method for propagating data over a meshed network of nodes comprising the steps of:
a) establishing a node as a transmitting node for a predetermined period of time;
b) establishing the remaining nodes as receiving nodes for a predetermined period of time;
c) transmitting a data message from the transmitting node along all links connected to the transmitting node;
d) each receiving node 1) listening for an incoming message on all of its links and 2) selecting a message as a source, if it is the only message that arrives on any of its links, or arbitrarily selecting a message as the source, if a message arrives on more than one link;
3) locking out all links which are not designated as a source, preventing them from receiving data for the remainder of the message;~
4) retransmitting each bit of data on all links, immediately after each bit of data is received by the receiving node; and 5) unlocking all links when the message is completed.
2. The method of claim 1 wherein the transmitting node is established by:
a) providing each node in the mesh with an identical access table, the table having entries indicating which nodes are capable of transmitting;
b) providing a pointer within the table, the pointer indicating which nodes~
may transmit at a particular time; and c) allowing the pointer to sequentially step through the table entries to allow different nodes on the mesh to transmit.
3. The method of claim 2, wherein the pointer within the table is time based and sequentially steps through each entry after a predetermined amount of time has lapsed.
4. The method of claim 3, further comprising the steps of:
a) incrementing a counter for each tier of nodes the data passes through;
b) calibrating the counter to represent the time delay incurred by each tier;~
and~
c) calibrating the time based pointer of each receiving node based upon the counter.
5. The method of claim 1 wherein the step of arbitrarily selecting a message, if a message arrives on more than one link, further includes providing each node with a circuit having arbitration and lockout logic, wherein the circuit:
a) allows two or messages arriving simultaneously to be logically combined together to form a single, correct output; and b) ensures that at least one link provides a correct output if two or more messages arrive at a node so close in time so as to cause one or more links to become metastable.
6. The method of claim 2, wherein the step of establishing a transmitting node 7. includes:
a) establishing a plurality of submeshes within the mesh;
b) allowing one node in each submesh to be designated as a transmitting node; and c) setting the nodes lying along the boundaries of each submesh to submesh specific parameters.
7. The method of claim 6, wherein submesh specific parameters are set by temporarily coupling the links of the node together so that messages received from a first submesh are only retransmitted to the first submesh and messages received from a second submesh are only retransmitted to a second submesh.
8. The method of claim 7 wherein the submesh specific parameters are established by adding an extra byte of data to each entry of the access table which identifies link interconnectivity for each table entry.
9. The method of claim 1 further including:
providing a self checking pair of nodes for every node in the mesh;
comparing the data received by one node of the self checking pair against the data received by the second node of the self checking pair;
allowing the data to be retransmitted only if the data received by the nodes in the self checking pair matches.
10. An arbitration and lockout circuit for use with a node in a meshed network comprising:
a plurality of input links;
a plurality of flip-flops, each flip flop being coupled to a single input link.
wherein the input link is coupled to the input of the flip flop;
a plurality of AND gates, each AND gate having a first input and a second input, wherein the first input is coupled directly to the input link and the second input is coupled to an output of the flip flop;
an OR gate, the OR gate having a plurality of inputs and an output, wherein an output from each AND gate provides an input into the OR gate, wherein the output of the OR gate provides an output for the node and also provides a clock signal for each of the plurality of said flip flops.
11. The circuit of claim 10, further comprising an idle input in each of the plurality of flip flips, the idle input causing the output of the flip flop to go high when the idle input is tripped.
12. The circuit of claim 11, wherein the plurality of flip-flaps are configured so that when the OR gate outputs a clock signal, any of the plurality of flip flops having a low input will be caused to have their output go low, while those outputs having a high input will maintain a high output.
13. The circuit of claim 12, wherein any of the plurality of flip-flops which have been caused to have a low output will continue to have a low output until the idle input is tripped.
14. The circuit of claim 13 wherein the idle input will be tripped after a predetermined period of time.
15. The circuit of claim 14, wherein the predetermined period of time is defined within an access table within the node, the access table defining the length of time any given node within the mesh may transmit.
16. The circuit of claim 13 wherein the idle input will be tripped when an end of message indicator is received by the node.
17. A node for use in a meshed network, comprising:
a first data receiver;
a first data transmitter, coupled to the receiver.
a first plurality of links, each link having an input and an output, the inputs being coupled to the receiver and the outputs being coupled to the transmitter so that data received via one link input is immediately retransmitted on all link outputs;
an arbitration and lockout logic circuit including;
means for allowing data to be correctly transmitted, if data is received only via one link input means for allowing data to be correctly transmitted, if data is received via a plurality of link inputs simultaneously; and means for allowing data to be correctly transmitted, if data is received via a plurality of links in such a timing sequence as to cause one or more link inputs to become metastable.
18. The node of claim 17, further comprising:
an access table, the access table identifying a sequence of all nodes interconnected on the mesh which are capable of transmitting; and indicator indicating which nodes may transmit.
19. The node of claim 18, wherein the indicator is time based.
20. The node of claim 18, wherein the indicator is advanced when an end of message indicator is received at the node.
21. The node of claim 18 wherein the access table is software based.
22. The node of claim 18 wherein the access table is hardware based.
23. The node of claim 18, wherein the access table will only permit one node on the mesh to transmit at any given time.
24. The node of claim 18, wherein the access table defines a plurality of submeshes within the mesh and will permit one node in each submesh to transmit simultaneously.
25. The node of claim 24 further comprising means for temporarily establishing various link interconnectivity connections.
26. The node of claim 17, further comprising:
a second receiver;
a second transmitter, coupled to the second receiver;
a second plurality of links, each link having an input coupled to the second receiver and an output coupled to the transmitter; and a comparing circuit, the comparing circuit compares data received by the first receiver to data received by the second receiver and only allows data to be retransmitted if the data from the first receiver matches the data from the second receiver.
CA002359539A 1999-01-14 1999-12-21 Flooding communication Abandoned CA2359539A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US11592199P 1999-01-14 1999-01-14
US60/115,921 1999-01-14
PCT/US1999/030682 WO2000041506A2 (en) 1999-01-14 1999-12-21 Flooding communication

Publications (1)

Publication Number Publication Date
CA2359539A1 true CA2359539A1 (en) 2000-07-20

Family

ID=22364153

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002359539A Abandoned CA2359539A1 (en) 1999-01-14 1999-12-21 Flooding communication

Country Status (7)

Country Link
US (1) US6651106B1 (en)
EP (1) EP1142135B1 (en)
JP (1) JP2003527765A (en)
AT (1) ATE280451T1 (en)
CA (1) CA2359539A1 (en)
DE (1) DE69921360T2 (en)
WO (1) WO2000041506A2 (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10044417A1 (en) * 2000-09-08 2002-04-04 Siemens Ag Process and communication device to support different CSTA phases
US7733807B2 (en) * 2004-11-09 2010-06-08 Cisco Technology, Inc. Systems and methods for accelerated learning in ring networks
US20080037989A1 (en) * 2006-08-14 2008-02-14 Paul Douglas Stoner Method And Apparatus For Handling Data And Aircraft Employing Same
US20080089087A1 (en) * 2006-10-16 2008-04-17 Paul Douglas Stoner Apparatus and Method Pertaining to Light-Based Power Distribution in a Vehicle
US8331346B2 (en) * 2006-12-21 2012-12-11 Palo Alto Research Center Incorporated Distributed context-aware scheduled access in a network
US8204037B2 (en) * 2007-08-28 2012-06-19 Honeywell International Inc. Autocratic low complexity gateway/ guardian strategy and/or simple local guardian strategy for flexray or other distributed time-triggered protocol
WO2009093322A1 (en) * 2008-01-24 2009-07-30 Mitsubishi Electric Corporation Band-guarantee communication system
US8498276B2 (en) 2011-05-27 2013-07-30 Honeywell International Inc. Guardian scrubbing strategy for distributed time-triggered protocols
US8908675B2 (en) 2012-01-13 2014-12-09 Honeywell International Inc. Virtual pairing for consistent data broadcast
US8949983B2 (en) 2012-02-21 2015-02-03 Honeywell International Inc. System and method for integrity reconstitution
US9619249B2 (en) 2014-03-06 2017-04-11 Honeywell International Inc. Flexible fixed-content dynamically changeable wall module user interface
DE102015216886A1 (en) * 2015-09-03 2017-03-09 Robert Bosch Gmbh Method, device and computer program for operating a data processing system
CN113542935A (en) * 2020-04-22 2021-10-22 华为技术有限公司 Signal frame processing method and related equipment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4237534A (en) * 1978-11-13 1980-12-02 Motorola, Inc. Bus arbiter
JPH04368034A (en) * 1991-06-17 1992-12-21 Fujitsu Ltd Communication equipment
US6032194A (en) * 1997-12-24 2000-02-29 Cisco Technology, Inc. Method and apparatus for rapidly reconfiguring computer networks

Also Published As

Publication number Publication date
WO2000041506A3 (en) 2001-01-18
ATE280451T1 (en) 2004-11-15
EP1142135A2 (en) 2001-10-10
JP2003527765A (en) 2003-09-16
DE69921360T2 (en) 2005-10-27
WO2000041506A2 (en) 2000-07-20
US6651106B1 (en) 2003-11-18
EP1142135B1 (en) 2004-10-20
DE69921360D1 (en) 2004-11-25

Similar Documents

Publication Publication Date Title
EP1142135B1 (en) Flooding communication
EP0147644B1 (en) Token ring with secondary transmit opportunities
EP0422914B1 (en) Station-to-station full duplex communication in a communications network
EP0244117B1 (en) A method of duplex data transmission using a send-and-wait protocol
EP0103460B1 (en) Improvements in or relating to data interconnecting networks
EP0123507B1 (en) Data communication system and apparatus
EP1198105A2 (en) High speed transmission line interface
JPS5936459A (en) Data communication device
US7684909B2 (en) Data transmission method and device
US7149920B2 (en) Deterministic error recovery protocol
US4843605A (en) Node apparatus for communication network having multi-conjunction architecture
JPH0191556A (en) Node equipment for indefinite communication network
JP2739239B2 (en) Node device of communication network
JP2643089B2 (en) Error detection and recovery system in parallel / serial bus
JP2582585B2 (en) Node device of irregular communication network
EP0630496A1 (en) Accelerated token ring network
Hutchison Local area networks: an introduction
JPS6022849A (en) Method for setting automatically address in transmission system
Abdul-Ghani et al. High-speed optical-fibre ring network with a register insertion access protocol
JP2750314B2 (en) Non-buffered switching equipment
KR20230084123A (en) Dual bus for automatic monitoring and control systems in nuclear power plants and other industrial facilities
Buchanan Some Studies on CAN Specification
JPH02174336A (en) Node equipment for indefinite communication network
JPS6374347A (en) Node equipment for undefined communication network
JPH01837A (en) Node equipment and network monitoring equipment for amorphous communication networks

Legal Events

Date Code Title Description
FZDE Discontinued